Investigation Report: The Hong Kong Police Force. Leaked Internal Documents Containing Personal Data. via Foxy

Size: px
Start display at page:

Download "Investigation Report: The Hong Kong Police Force. Leaked Internal Documents Containing Personal Data. via Foxy"

Transcription

1 Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Investigation Report: The Hong Kong Police Force Leaked Internal Documents Containing Personal Data via Foxy (English translation) (This is an English translation of the Report compiled in Chinese. In the event of any conflict between this English version and the Chinese version, the Chinese version shall prevail.) Report Number: R Date issued: 24 October 2013

2 Investigation Report: The Hong Kong Police Force leaked internal documents containing personal data via Foxy This is the report of the investigation carried out by the Privacy Commissioner for Personal Data (the Commissioner ) pursuant to section 38(b) of the Personal Data (Privacy) Ordinance, Cap. 486 (the Ordinance ) against the Hong Kong Police Force (the HKPF ) in relation to two incidents of data leakage of police documents containing personal data via Foxy, a peer-to-peer file sharing software ( Foxy ) in August 2011 and September 2012 respectively. This report is published in the exercise of the power conferred on the Commissioner by Part VII of the Ordinance. Section 48(2) of the Ordinance provides that the Commissioner may, after completing an investigation and if he is of the opinion that it is in the public interest to do so, publish a report (a) setting out - (i) the result of the investigation; (ii) any recommendations arising from the investigation that the Commissioner thinks fit to make relating to the promotion of compliance with the provisions of this Ordinance, in particular the data protection principles, by the class of data users to which the relevant data user belongs; and (iii) such other comments arising from the investigation as he thinks fit to make; and (b) in such manner as he thinks fit. ALLAN CHIANG Privacy Commissioner for Personal Data 2

3 Investigation Report: The Hong Kong Police Force leaked internal documents containing personal data via Foxy Media reported that members of the public found the Hong Kong Police Force ( HKPF ) accidentally leaking internal documents which contain personal data via the sharing software Foxy. An investigation into two incidents concluded that the HKPF did not adhere to the Data Protection Principle 4 ( DPP4 ) with regard to data security in a case that involves 210 copies of witness statements, internal documents and correspondences. But the HKPF has since 2009 implemented adequate data protection measures to prevent recurrence of similar incidents. However, human errors cannot be totally eliminated. In this regard, the Commissioner advocates the building of a privacy culture in the HKPF. Background 2. This Office received a complaint 1 in August 2008 which alleged that the HKPF leaked its police documents containing personal data through Foxy 2 ( the Case ). After investigation by this Office, it was found that although the HKPF had instructed its off-duty officers not to take away documents containing personal data without approval, some officers would nevertheless store these documents in their personal floppy discs/portable storage devices and their personal computers for catching up with work. This was the cause for the data leakage incident. 3. The Commissioner therefore decided in the Case that the HKPF had contravened DPP4 of Schedule 1 to the Ordinance 3 for failing to take practicable measures to protect the complainant s personal data against unauthorised or accidental access, and served on the HKPF an Enforcement Notice pursuant to section 50 of the Ordinance on 23 December In January 2010, the HKPF confirmed to the Commissioner that it had taken a series of measures to comply with the requirements of the Enforcement Notice, which included (among others), stating clearly that the HKPF officers were forbidden to use their own computers installed 1 Case No Foxy is a peer-to-peer file sharing software developed by a Taiwanese IT company. Users generally may not be aware that Foxy would run automatically each time a computer is switched on, causing files in the computer to be sharable for download by anyone else running Foxy. Users may not have an effective means to stop the sharing and have no way to know who has downloaded their files. More information is available from: 3 The Personal Data (Privacy) Ordinance was substantially amended on 1 October 2012, but the applicable law during the material time of this case was the version before 1 October

4 with Foxy for work, that they were forbidden to use any personal information and communication devices/ data storage devices of any kind for work purposes, and making protecting personal and confidential data as part of the code of conduct that should be observed by the HKPF officers, etc. 4. In August 2011 and September 2012, the media reported that numerous police documents containing personal data were searchable via Foxy. (see the table below). Table: Two data breach incidents under investigation Documents containing personal data leaked via Foxy Incident 1 (reported in the press in August 2011) A Reply Slip of Preliminary Selection of Police Constable Application of the HKPF s Recruitment Division ( the Reply Slip ), which contained the personal data of an applicant, including his name and HKID card number. Incident 2 (reported in the press in September 2012) (Other documents included an operation record of HKPF officers ( the Record ) containing operation details and a witness statement ( the Statement ) containing the personal data including the name and address of a witness. These items were not included in this investigation as they had been covered in the Case) 210 copies of witness statements, HKPF s internal memoranda, forms and correspondence ( the Documents ) were leaked on the Internet via Foxy. The personal data involved were names, HKID card numbers, addresses and details of the prosecution of some witnesses and arrested persons. 4

5 Follow-up by this Office 5. This Office made written enquiries to the HKPF on 23 August 2011 and 10 September According to the information obtained by this Office, the Record and the Statement in Incident 1 had been leaked as early as in 2008 and were within the scope of the investigation and the Enforcement Notice issued in relation to the Case. However, the Reply Slip and the Documents were not within the scope of the Case. The Commissioner therefore decided in October 2012 to commence formal investigation against the HKPF to ascertain whether its handling of documents containing personal data in the two incidents had contravened the relevant requirements of the Ordinance. Relevant Provisions of the Ordinance 6. The provisions of direct relevance under the Ordinance to this case are as follow: DPP4 of Schedule 1 to the Ordinance: All practicable steps shall be taken to ensure that personal data (including data in a form in which access to or processing of the data is not practicable) held by a data user are protected against unauthorized or accidental access, processing, erasure or other use having particular regard to (a) the kind of data and the harm that could result if any of those things should occur; (b) the physical location where the data are stored; (c) any security measures incorporated (whether by automated means or otherwise) into any equipment in which the data are stored; (d) any measures taken for ensuring the integrity, prudence and competence of persons having access to the data; and (e) any measures taken for ensuring the secure transmission of the data. 7. Moreover, according to section 2(1) of the Ordinance, practicable means reasonably practicable. 4 Case Nos and

6 Information obtained in relation to Incident 1 Replies of the HKPF 8. In response to our enquiry, the HKPF provided the following information: 8.1 As the HKPF had not installed any file-sharing software including Foxy in its computer system, the Reply Slip was not leaked from the HKPF s computer system; 8.2 According to the HKPF s record, it had sent a template file of Reply Slip of Preliminary Selection of Police Constable Application to the person whose personal data was leaked via the HKPF s system in the incident ( the Data Subject ). He was the one who had applied for the post. Later on, the Data Subject returned the completed Reply Slip to the HKPF in person and not by ; and 8.3 According to the HKPF, its investigation officers had contacted the Data Subject and inspected his computer. It was found that Foxy was installed and the Reply Slip was stored as a file in the Data Subject s computer. There was no information showing that the leakage was caused by the HKPF s officers or the HKPF s information system problems. Hence, the HKPF believed that the incident was caused by the Foxy file-sharing software installed in the Data Subject s computer. Replies of the Data Subject 9. This Office wrote to the Data Subject to seek his response to the HKPF s reply above. The Data Subject confirmed in writing that Foxy was installed in his computer at the material time. The HKPF subsequently checked and found a file-sharing option in the Foxy which could not be deactivated. The information stored in his computer was therefore downloadable in its entirety by others. It was very likely that this was the cause of the data leakage. 6

7 Information obtained in relation to Incident 2 Replies of the HKPF 10. In response to our enquiries, the HKPF provided the following information: 10.1 According to the HKPF, subsequent to the issue of the Enforcement Notice on the HKPF in 2009 by this Office, the HKPF has taken improvement measures, including configuring the USB ports of HKPF s computers since August 2009 to accept approved USB thumb drives only; formulation of information security instructions and guidelines; strengthening of security measures and support; and enhancement of the HKPF officers knowledge of information security. In this connection, the HKPF provided to this Office for reference the relevant parts of Police General Orders ( PGO ) and the Force Information Security Manual ( FISM ) revised since 2009; 10.2 The PGO and the FISM were uploaded to the HKPF s intranet for the information of all the HKPF officers. They would also be informed of any amendment by announcements on noticeboards. Every officer is duty-bound to read the provisions; 10.3 Regarding the leakage of the Documents in Incident 2, the HKPF s initial enquiry revealed that a police officer ( the Police Officer ) had since 2007 occasionally used his private USB thumb drive to download documents to his own computer ( the Computer ) and occasionally used the Computer for work purpose, all without the approval of the HKPF; 10.4 The Police Officer had attended training organised by the HKPF on four days between February 2009 and May The training included personal data protection and information security requirements in the PGO and the FISM; 7

8 10.5 The HKPF reminded all officers of the importance of information security and their duty to observe the same by on 23 November The also stated that officers shall not use their own computers for work purpose unless prior approval from the Formation Information Technology Security Officer ( FITSO ) has been obtained in accordance with the FISM. According to the HKPF s record, the Police Officer read the on 13 December 2010; 10.6 The Police Officer sold the Computer in mid-2011 without first handing the equipment to the FITSO for inspection in accordance with the requirement of the FISM; 10.7 Though the Police Officer had tried to delete all the information in the hard disk by the erasure software that came with the Computer before selling the Computer, he did not remove the hard disk or use the software approved by the Chief Systems Manager (Information Technology Branch) to securely erase all the official information in accordance with the requirements of the FISM; 10.8 Therefore, the HKPF considered that the Documents could have been recovered from the hard disk after sale of the Computer, and the data was leaked subsequently. The HKPF pointed out that the incident was just an isolated case and was not related to the security of its information system; and 10.9 Police officers who repeatedly or blatantly violated the requirements of the FISM will be subject to disciplinary action. The HKPF is conducting a disciplinary investigation against the Police Officer under section 3(2)(e) of the Police (Discipline) Regulations (Cap. 232A), for the punishable disciplinary offence of contravention of police regulations, or any police orders, whether written or verbal. 8

9 Statement of the Police Officer 11. The Police Officer made a statement to this Office in respect of Incident 2 which contains the following information: 11.1 The Police Officer admitted that since his unit in which he worked in 2007 had only one office computer, he had used his own USB thumb drive to download certain documents containing personal data from the HKPF s computer to the Computer for work convenience. But the Police Officer clarified that he had only downloaded such documents once; 11.2 The Computer was used for handling office work until August 2008 when he was transferred to a post with an office computer provided. Following another job transfer in February 2009, he resumed using the Computer for office work; 11.3 However, the Police Officer claimed that he had not used the Computer to connect to the Internet or allowed others to use the Computer, so leakage of documents stored in the Computer by Foxy was impossible; 11.4 In mid-2011, the Police Officer sold the Computer. Before the sale, he had formatted the hard disk repeatedly by using the software that came with the Computer, but the software was not the one approved by the Chief Systems Manager (Information Technology Branch) in accordance with the FISM. Moreover, the Police Officer had not surrendered the Computer to FITSO for inspection before sale, thus contravening the requirements in the FISM; and 11.5 The Police Officer stated that he knew that HKPF officers had to obtain prior approval before using their own computers for work purposes. He also knew that before selling the Computer which had been used for work purposes, the HKPF required that the hard disks had to be removed, that an approved software had to be used for data erasure, and that the computers had to be handed to FITSO for inspection. But since he had not applied for permission before using the Computer for work purposes in the first place and he did not envisage that his act would lead to serious consequences, he had not followed the above-mentioned requirements. 9

10 The Findings of the Commissioner 12. Under DPP4, the HKPF is obliged to take all practicable steps to ensure that personal data held by it are protected against unauthorised or accidental access, processing, erasure or other use. 13. In this case, the Commissioner has to consider whether the HKPF has taken all reasonably practicable measures to safeguard the personal data in the Reply Slip in Incident 1 and the Documents in Incident 2. Whether the HKPF Had Contravened DPP4 in Incident 1? 14. According to the HKPF, Foxy was not installed in its computer system, but it was installed in the Data Subject s computer which stored the file of the Reply Slip. Hence, the HKPF believed that the leakage of the Reply Slip was caused by the Foxy installed in the Data Subject s computer. 15. The Data Subject agreed with the HKPF s view. He added that there was a file-sharing option in the Foxy that could not be deactivated, but at that time he was not aware that the data in his computer could be downloaded by others due to this setting. 16. The information provided by the HKPF and the Data Subject in this incident was consistent, and there was no information showing that Incident 1 was caused by other reasons. Hence, the Commissioner does not find in Incident 1 a DPP4 contravention on the part of the HKPF. Whether the HKPF Had Contravened DPP4 in Incident 2? 17. In examining whether the HKPF had contravened DPP4 in Incident 2, the Commissioner has to consider two aspects. Firstly, the Commissioner has to understand the cause of the incident and ascertain whether the HKPF had any policy in place to prevent the incident from happening. Secondly, the Commissioner has to examine whether the HKPF had taken adequate measures to ensure that the relevant HKPF officers knew, understood and complied with the policy. If there was policy alone but no mechanism or measures to implement it, the HKPF could still contravene DPP4. 10

11 18. The Commissioner has examined the revisions or improvements in information security measures laid down in the PGO and the FISM. He noted that the following new requirements 5 have been in place since August 2009 ( the 2009 requirements ): (a) PGO Chapter 19-21: Security measures such as encryption using Force provided tools, and password protection of electronic files/data shall be taken to protect sensitive or classified information ; (b) PGO Chapter 19-21: Force members are not permitted to use their private ICT [information and communications technology] equipment (e.g. memory cards, USB thumb drives or non-government provided storage facilities) to process or store electronic information or data unless written approval has been obtained from their Formation Commander who may seek advice from the FITSO or CIP SCU IS ; (c) PGO 19-21: Force members shall not carry any information or electronic data (stored in any media) of or above Confidential classification off police premises unless prior approval from direct supervisor at SP rank or above has been obtained ; (d) FISM paragraph : Classified information must not be processed or stored in privately owned computers and privately owned portable electronic storage devices, such as USB storage devices, Flash memory cards, except with the written approval from the Formation Commander of SP rank or above ; (e) FISM paragraph : user who wishes to withdraw privately owned computers for official use at work shall notify the FITSO seven days before removing it from the formation. The FITSO shall conduct a physical inspection of the hard disk drive and all data storage media containing official information to ensure that all data connected with official purposes are securely erased, by using software approved by CSM IT [Chief System Manager (Information Technology Branch)], before removal ; 5 Requirements in paragraphs 18(a) to (c) are quoted from the current version of the PGO. Requirements in paragraphs 18(d) to (f) are translation of the provisions in the August 2009 version of the FISM. 11

12 (f) FISM paragraph : Before the removal for repair or the transfer of ownership of any privately owned computer which has been approved for duty purposes, the hard disk shall be physically removed or securely erased, by using software approved by CSM IT, of all data relating to the officer s official duties. The officer shall not allow unauthorized persons access to the information on the hard disk. 19. There is an apparent discrepancy between the information provided by the HKPF (paragraph 10.3 above) and the Police Officer (paragraph 11.1 above) as to how often the Police Officer had used his own USB thumb drive to download police documents containing personal data from police computers. Nevertheless, since the USB ports of the HKPF s computers accepted in practice only approved USB thumb drives from August 2009, it can be deduced that any such unauthorised downloading by the Police Officer would have ceased at the latest by August However, during the period between 2007 and August 2009, the improved security requirements noted in paragraphs 18(b) to (d) above, and the specific measure that only authorised USB thumb drives may be accepted by HKPF s USB connectors noted in paragraph 10.1 above were not in place. At that time, there were only general guidelines on using HKPF officers own computers for official purpose in the FISM (i.e. police officers were required to seek prior approval). With regard to the handling and storage of electronic data or use of private USB thumb drives, there was no specific instruction and guideline in the then FISM and PGO. 20. Therefore, in keeping with our conclusion in the Case of 2009, the Commissioner is of the view that when the Police Officer downloaded police documents containing personal data to his private USB thumb drive, the HKPF had not taken all practicable measures to prevent this misconduct from occurring. Hence, it had contravened DPP Notwithstanding this finding, the HKPF had in 2007 required the HKPF officers to seek prior approval for the use of their own computers for work purposes. Also, the 2009 requirements were formulated to prevent police officers from using USB thumb drives to store police documents, and to ensure that police documents stored in HKPF officers own computers would be safely deleted. Besides, the HKPF had used various means as set out in paragraph 10 to inform police officers of those instructions and guidelines, including the uploading of the PGO and the FISM to the HKPF s intranet, the sending of reminder to all officers, and, in particular, the provision of four relevant training sessions to the Police Officer between 2009 and 12

13 2010. In the circumstances, the continued unauthorised use of the Computer for work after August 2009 with the previously downloaded and stored police documents, and the improper means in deleting the official information before sale of the Computer in mid-2011, represented the acts and omissions attributable to the Police Officer, in contravention of the HKPF s standing instructions (which were revised in 2009). 22. In fact, according to the information provided by the HKPF, the Officer had attended four training sessions. The training materials gave an overview of the personal data protection and the requirements of the Ordinance. The 2009 requirements had been covered in the two training sessions held in (see paragraph 10.4 above). The Police Officer admitted that he knew the requirements. If the Police Officer, after learning the 2009 requirements, had sought the HKPF s approval for the continued use of the Computer for work purposes, and had complied with the requirements of the FISM by handing the Computer to FITSO for inspection, removing the hard disk and using approved software to delete the data before selling the Computer in 2011, Incident 2 should have been avoided. 23. The duty imposed on data users by DPP4 is that all practicable steps shall be taken to safeguard personal data. Data users obligations are not absolute. They are not expected to prevent data leakages at all costs. Whether a data user has contravened DPP4 depends on whether it has taken all practicable steps in formulating appropriate policies, devising a robust system to safeguard data and implementing adequate measures under this system. In view of the 2009 requirements drawn up by the HKPF, and the measures adopted in paragraph 10 (in particular the four training sessions provided by the HKPF to the Police Officer), the Commissioner opines that the measures taken by the HKPF at present are adequate. The Police Officer s post-2009 unauthorised and continuous use of the Computer for work purposes without approval, and his failure to use approved software to erase all official materials before the sale of the Computer, was an isolated incident of human error which does not constitute another DPP4 contravention on the part of the HKPF. The Commissioner therefore sees no justification to serve another Enforcement Notice on the HKPF directing it to step up its efforts to safeguard personal data. 13

14 Advice to the HKPF 24. It should be pointed out that although the HKPF currently has taken all practicable steps, given the importance and sensitivity of the personal data contained in the HKPF documents, the Commissioner urges the HKPF to go beyond fulfilling the minimum requirements under the Ordinance and strive for further means to safeguard data with a view to preventing recurrence of similar incidents. 25. Incident 2 revealed that despite the implementation of the HKPF s 2009 requirements, the past use of USB thumb drives to store official data/documents and the continued unauthorised and improper use of the HKPF officers own computers for work purposes by individual police officers could still lead to leakage of police data (which might contain personal data) years later. As police officers who used their own computers and USB thumb drives could be subject to disciplinary action due to breach of the 2009 requirements, they may be tempted not to follow the requirements of the FISM, but to use other means to fix the problem themselves. 26. In this regard, even though human errors cannot be totally eliminated, the Commissioner is of the view that the HKPF should proactively face the problem and adopt effective improvement measures to minimise data leakages caused by human error, including the above non-compliance of standing instructions by police officers who were caught in a dilemma. The HKPF can adopt different formal or informal means to address the above dilemma. To be effective, these means must be designed to suit the operation nature and corporate culture of the HKPF. Therefore, the Commissioner can only provide general advice to the HKPF but cannot prescribe measures in concrete terms. 27. For example, the Commissioner learned from the information obtained in the Case that the HKPF s IT Division had provided a Personal Computer Cleaning programme for police officers use in December 2009 to help them check and delete the personal data/confidential data on their own computers. Though this is an effective measure, the Police Officer was apparently unaware of the programme since he still adopted an improper method to erase the information contained in the Computer. The HKPF is advised to consider strengthening the internal promotion of this programme. The HKPF may also set up enquiry hotlines to offer assistance to police officers who wish to seek help on an anonymous basis. 14

15 28. In addition, the Commissioner recommends that the HKPF promotes case sharing and exchange of experience among police officers to enhance the awareness of personal data protection and the serious consequences that may ensue as a result of data leakages on the Internet. This will help promote the building of a privacy-respectful and data-secure culture, and compliance with the HKPF s security instructions and guidelines. Concluding Remarks 29. Data users are obliged to protect personal data by reasonable security safeguards against such risks as loss, unauthorised access, destruction, use, modification or disclosure of data. They should note that many security breaches are simply the result of human error. Recklessness or simple carelessness of a single employee can undermine sound privacy policies and robust security practices. This underlies the importance for organisations to institute comprehensive internal training and awareness programmes for their staff. To ensure an organisation-wide commitment, the building of a culture of privacy is imperative. 30. Organisations collecting and managing personal data are always faced with data security risks, regardless of the form in which the data is retained. However, rapid advances in computing power, coupled with easy access to desk-top and mobile devices globally connected through the Internet, have increased the scale and volume of personal data flows, the ability to store data indefinitely and the associated risks of data breaches. 31. Both data users and data subjects should be aware of the privacy pitfalls in the use of ICT. The Foxy software in this case is a good learning point. Once a data file is leaked through the Foxy network, there is practically no effective recovery means. Although the company which developed Foxy has ceased business, at least 400,000 users are still running this software on their computers. They are advised to make sure that they (and anyone using their computers) understand how their version of Foxy works and configure it appropriately to protect their data files. For persons who for some reasons still wish to download this software for use, they will have to resort to unofficial channels and thus run the risk of obtaining a copy which contains malware or one which may have been tampered with, rendering the extent of data sharing uncontrollable. 15

Personal Data (Privacy) Ordinance and Electronic Health Record Sharing System (Points to Note for Healthcare Providers and Healthcare Professionals)

Personal Data (Privacy) Ordinance and Electronic Health Record Sharing System (Points to Note for Healthcare Providers and Healthcare Professionals) Personal Data (Privacy) Ordinance and Electronic Health Record Sharing System (Points to Note for Healthcare Providers and Healthcare Professionals) The Electronic Health Record Sharing System Ordinance

More information

Investigation Report: Hospital Authority s Breach of Data Security. in Connection with Disposal of Patient Records

Investigation Report: Hospital Authority s Breach of Data Security. in Connection with Disposal of Patient Records Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Investigation Report: Hospital Authority s Breach of Data Security in Connection with Disposal of Patient Records Report

More information

Investigation Report: HKA Holidays Limited Leaked Customers Personal Data through the Mobile Application TravelBud

Investigation Report: HKA Holidays Limited Leaked Customers Personal Data through the Mobile Application TravelBud Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Investigation Report: HKA Holidays Limited Leaked Customers Personal Data through the Mobile Application TravelBud Report

More information

Guidance on the Use of Portable Storage Devices 1

Guidance on the Use of Portable Storage Devices 1 Guidance on the Use of Portable Storage Devices Introduction Portable storage devices ( PSDs ) such as USB flash memories or drives, notebook computers or backup tapes provide a convenient means to store

More information

Guidance on Personal Data Erasure and Anonymisation 1

Guidance on Personal Data Erasure and Anonymisation 1 Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data

More information

Protect your personal data while engaging in IT related activities

Protect your personal data while engaging in IT related activities Protect your personal data while engaging in IT related activities Personal Data (Privacy) Ordinance Six Data Protection Principles Principle 1 purpose and manner of collection of personal data Collection

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R10-11568

Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R10-11568 Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R10-11568 Date issued: 24 February 2010 Debt Collection Agency authorized by a Finance Company Disclosed

More information

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1 Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations

More information

Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R11-1696

Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R11-1696 Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R11-1696 Date issued: 20 June 2011 Transfer of Customers Personal Data by Fubon Bank (Hong Kong)

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

KINGDOM OF SAUDI ARABIA. Capital Market Authority CREDIT RATING AGENCIES REGULATIONS

KINGDOM OF SAUDI ARABIA. Capital Market Authority CREDIT RATING AGENCIES REGULATIONS KINGDOM OF SAUDI ARABIA Capital Market Authority CREDIT RATING AGENCIES REGULATIONS English Translation of the Official Arabic Text Issued by the Board of the Capital Market Authority Pursuant to its Resolution

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security LC Paper No. CB(1)2407/10-11(05) For Information on 13 June 2011 Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper informs Members about the progress

More information

KINGDOM OF SAUDI ARABIA. Capital Market Authority CREDIT RATING AGENCIES REGULATIONS

KINGDOM OF SAUDI ARABIA. Capital Market Authority CREDIT RATING AGENCIES REGULATIONS KINGDOM OF SAUDI ARABIA Capital Market Authority CREDIT RATING AGENCIES REGULATIONS English Translation of the Official Arabic Text Issued by the Board of the Capital Market Authority Pursuant to its Resolution

More information

(a) the kind of data and the harm that could result if any of those things should occur;

(a) the kind of data and the harm that could result if any of those things should occur; Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

How To Protect Your Personal Data In The United Kingdom

How To Protect Your Personal Data In The United Kingdom Guidance on the Proper Handling of Customers Personal Data for the Insurance Industry Contents 1. Introduction 2. An Overview of the Relevant Requirements under the Ordinance 2.1 What is personal data?

More information

Inspection Report: Personal Data System of Hong Thai Travel Services Limited

Inspection Report: Personal Data System of Hong Thai Travel Services Limited Published under Section 48(1) of the Personal Data (Privacy) Ordinance (Cap. 486) Inspection Report: Personal Data System of Hong Thai Travel Services Limited Report Number: R16-1927 Date of issue: 26

More information

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised

More information

What's Up with Apps in Hong Kong July 2013

What's Up with Apps in Hong Kong July 2013 What's Up with Apps in Hong Kong July 2013 In May this year, the Hong Kong Privacy Commissioner for Personal Data ("Privacy Commissioner") joined the Global Privacy Enforcement Network ("GPEN") to conduct

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 12 July 2010 LC Paper No. CB(1)2465/09-10(03) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper informs Members about the progress

More information

Cloud Computing. Introduction

Cloud Computing. Introduction Cloud Computing Introduction This information leaflet aims to advise organisations which are considering engaging cloud computing on the factors they should consider. It explains the relationship between

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Information Paper for the Legislative Council Panel on Financial Affairs. Protection of Consumer Credit Data

Information Paper for the Legislative Council Panel on Financial Affairs. Protection of Consumer Credit Data LC Paper No. CB(1)691/03-04(01) Information Paper for the Legislative Council Panel on Financial Affairs Protection of Consumer Credit Data Purpose Pursuant to the request by the Panel vide the Clerk to

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Businesses (Credit Information) Regulations 2015

2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Businesses (Credit Information) Regulations 2015 Draft Regulations to illustrate the Treasury s current intention as to the exercise of powers under clause 4 of the the Small Business, Enterprise and Employment Bill. D R A F T S T A T U T O R Y I N S

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS

FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Supervisory Policy Manual

Supervisory Policy Manual This module should be read in conjunction with the Introduction and with the Glossary, which contains an explanation of abbreviations and other terms used in this Manual. If reading on-line, click on blue

More information

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Appendix 11 - Swiss Data Protection Act

Appendix 11 - Swiss Data Protection Act GLEIF- LOU Restricted Appendix 11 - Swiss Data Protection Act GLEIF Revision Version: 1.0 2015-09-23 Master Copy page 2 of 11 Applicable Provisions of the Swiss Data Protection Act (DPA) including the

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

Residential Properties (First-hand Sales) Ordinance

Residential Properties (First-hand Sales) Ordinance Guidelines No. G06/15 Residential Properties (First-hand Sales) Ordinance Guidelines on Submission of Documents to the Sales of First-hand Residential Properties Electronic Platform General 1. With effect

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

DBS Bank (China) Limited Debit Card Users Guide

DBS Bank (China) Limited Debit Card Users Guide DBS Bank (China) Limited Debit Card Users Guide Risk Disclosure for Use of Debit Card Terms and Conditions on Debit Card 1 General Provisions 2 Application 3 Account 4 Usage of Debit Card 5 Password 6

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

ENISA s ten security awareness good practices July 09

ENISA s ten security awareness good practices July 09 July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European

More information

TIPS IN PREVENTING INFORMATION LEAKAGE

TIPS IN PREVENTING INFORMATION LEAKAGE TIPS IN PREVENTING INFORMATION LEAKAGE 1 Presented by Christina Keing and Frankie Fu Information Security Section (ISS), ITSC 5 Sept 2008 AIMS 2 AGENDA Recent incidents What information to protect? How

More information

AlixPartners, LLP. General Data Protection Statement

AlixPartners, LLP. General Data Protection Statement AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection

More information

2015 No. 1945 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Business (Credit Information) Regulations 2015

2015 No. 1945 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Business (Credit Information) Regulations 2015 S T A T U T O R Y I N S T R U M E N T S 2015 No. 1945 FINANCIAL SERVICES AND MARKETS The Small and Medium Sized Business (Credit Information) Regulations 2015 Made - - - - 26th November 2015 Coming into

More information

PERSONAL DATA PROTECTION POLICY RELATING TO CIGNA EUROPE INSURANCE COMPANY S.A.-N.V. SINGAPORE BRANCH

PERSONAL DATA PROTECTION POLICY RELATING TO CIGNA EUROPE INSURANCE COMPANY S.A.-N.V. SINGAPORE BRANCH PERSONAL DATA PROTECTION POLICY RELATING TO CIGNA EUROPE INSURANCE COMPANY S.A.-N.V. SINGAPORE BRANCH Personal data protection in Singapore is regulated by the Personal Data Protection Act 2012 (the PDPA

More information

Electronic Health Record Sharing System Bill. Contents. Part 1. Preliminary. 1. Short title and commencement... C1203. 2. Interpretation...

Electronic Health Record Sharing System Bill. Contents. Part 1. Preliminary. 1. Short title and commencement... C1203. 2. Interpretation... C1193 Electronic Health Record Sharing System Bill Contents Clause Page Part 1 Preliminary 1. Short title and commencement... C1203 2. Interpretation... C1203 3. Substitute decision maker... C1213 4. Ordinance

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; OBJECTS AND REASONS This Bill would provide for (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; (b) the protection of the privacy of individuals in relation

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Personal Data Protection LAWS OF MALAYSIA. Act 709 PERSONAL DATA PROTECTION ACT 2010

Personal Data Protection LAWS OF MALAYSIA. Act 709 PERSONAL DATA PROTECTION ACT 2010 1 LAWS OF MALAYSIA Act 709 PERSONAL DATA PROTECTION ACT 2010 2 Laws of Malaysia ACT 709 Date of Royal Assent...... 2 June 2010 Date of publication in the Gazette......... 10 June 2010 Publisher s Copyright

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY 1. Purpose 1.1 The Data Protection Act 1998 ( the Act ) has two principal purposes: i) to regulate the use by those (known as data controllers) who obtain,

More information

Secure Your Information and Communication Technology Devices

Secure Your Information and Communication Technology Devices You should pay attention to the following items bef the Internet: Secure Your Information and Communication Technology Devices Install proper anti-virus software P.3 Log on as a user and not as an administrator

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Policy on the Security of Informational Assets

Policy on the Security of Informational Assets Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources

More information

Guidance on the Proper Handling of Customers Personal Data for the Banking Industry 1

Guidance on the Proper Handling of Customers Personal Data for the Banking Industry 1 Guidance on the Proper Handling of Customers Personal Data for the Banking Industry CONTENTS 1. INTRODUCTION [2] 2. AN OVERVIEW OF THE RELEVANT REQUIREMENTS UNDER THE ORDINANCE 2.1 What is personal data?

More information

ATMD Bird & Bird. Singapore Personal Data Protection Policy

ATMD Bird & Bird. Singapore Personal Data Protection Policy ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

Act on Background Checks

Act on Background Checks NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which

More information

LC Paper No. CB(2)1515/13-14(01)

LC Paper No. CB(2)1515/13-14(01) LC Paper No. CB(2)1515/13-14(01) Annex I Comments on the legal and drafting issues on Electronic Health Record Sharing System Bill Clause 1 (Short title and commencement) 1. Please advise the expected

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

Management Standards for Information Security Measures for the Central Government Computer Systems

Management Standards for Information Security Measures for the Central Government Computer Systems Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...

More information

Clause 1. Definitions and Interpretation

Clause 1. Definitions and Interpretation [Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

BEConnected User Agreement

BEConnected User Agreement BEConnected User Agreement Page 1 of 5 INTRODUCTION This is a legal document between you and the owner ( Belmont College ) of the Apple ipad tablet ( ipad ) in connection with the delivery of an ipad to

More information

MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD.

MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD. MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD. WHISTLEBLOWING POLICY AND GUIDELINES 16 March 2012 Version 1.0 TABLE OF CONTENTS WHISTLEBLOWING POLICY Page WHISTLEBLOWING GUIDELINES B1 DEFINITION

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

Personal Information Protection Act Information Sheet 11

Personal Information Protection Act Information Sheet 11 Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores

More information

2) applied methods and means of authorisation and procedures connected with their management and use;

2) applied methods and means of authorisation and procedures connected with their management and use; Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.

More information

Data Protection. Policy and Application July 2009

Data Protection. Policy and Application July 2009 Data Protection Policy and Application July 2009 Produced for staff of the House of Commons Service by the Department of Resources Information Rights and Information Security (IRIS) Service Data Policy:

More information

Fairness at Work (Grievance Policy & Procedure)

Fairness at Work (Grievance Policy & Procedure) Fairness at Work (Grievance Policy & Procedure) Publication Scheme Y/N Department of Origin Policy Holder Author Related Documents Can be Published on Force Website HR Operations Head of HR Operations

More information

to the practitioner any improper debt recovery actions taken by the debt-collection company.

to the practitioner any improper debt recovery actions taken by the debt-collection company. Circular Circular No. 08-04 (CR) Practitioners must enter into a debt-collection-company appointment agreement Practitioners must monitor the performance of the debt-collection companies Using Debt-Collection

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV

More information

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency

More information

Consultation Document on Review of the Personal Data (Privacy) Ordinance

Consultation Document on Review of the Personal Data (Privacy) Ordinance Consultation Document on Review of the Personal Data (Privacy) Ordinance August 2009 Contents Page Foreword Executive Summary i iii Chapter One : Introduction 1 Chapter Two : An Overview of the Personal

More information

Data Protection Policy.

Data Protection Policy. Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data

More information

MCOLES Information and Tracking Network. Security Policy. Version 2.0

MCOLES Information and Tracking Network. Security Policy. Version 2.0 MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

IT Data Security Policy

IT Data Security Policy IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...

More information

AUDIT ACT. 2008 Revised Edition CAP. 32.02

AUDIT ACT. 2008 Revised Edition CAP. 32.02 AUDIT ACT CAP. 32.02 Audit Act CAP. 32.02 Arrangement of Sections AUDIT ACT Arrangement of Sections Section PART 1 PRELIMINARY 7 1 Short title... 7 2 Definitions... 7 PART 2 AUDITOR-GENERAL AND THE AUDIT

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

Data Protection Policy

Data Protection Policy 1 Data Protection Policy Version 1: June 2014 1 2 Contents 1. Introduction 3 2. Policy Statement 3 3. Purpose of the Data Protection Act 1998 3 4. The principles of the Data Protection Act 1998 4 5 The

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

Personal data privacy protection: what mobile apps developers and their clients should know

Personal data privacy protection: what mobile apps developers and their clients should know Personal data privacy protection: what mobile Introduction This technical information leaflet aims to highlight the privacy implications that mobile applications ( mobile apps ) developers (including organisations

More information

IT SECURITY POLICY (ISMS 01)

IT SECURITY POLICY (ISMS 01) IT SECURITY POLICY (ISMS 01) NWAS IM&T Security Policy Page: Page 1 of 14 Date of Approval: 12.01.2015 Status: Final Date of Review Recommended by Approved by Information Governance Management Group Trust

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

The United States Federal Trade Commission ("FTC") and the Office of the Data Protection Commissioner of Ireland (collectively, "the Participants"),

The United States Federal Trade Commission (FTC) and the Office of the Data Protection Commissioner of Ireland (collectively, the Participants), MEMORANDUM OF UNDERSTANDING BETWEEN THE UNITED STATES FEDERAL TRADE COMMISSION AND THE OFFICE OF THE DATA PROTECTION COMMISSIONER OF IRELAND ON MUTUAL ASSISTANCE IN THE ENFORCEMENT OF LAWS PROTECTING PERSONAL

More information

Bank of Israel. 1. Background. In recent years, cloud. environmentally. from. aspects in. these. 2. Applicability. Directive ). 3.

Bank of Israel. 1. Background. In recent years, cloud. environmentally. from. aspects in. these. 2. Applicability. Directive ). 3. Bank of Israel Supervisor of Banks Jerusalem, 12 Tammuz 5775 June 29, 2015 15LM2087 To: The Banking Corporations Attn: Chief Executive Officer Re: Risk management in a cloud computing environment 1. Background

More information